Thursday, March 6, 2025
HomeCyber AttackNorth Korean IT Workers Exploit GitHub to Launch Global Cyber Attacks

North Korean IT Workers Exploit GitHub to Launch Global Cyber Attacks

Published on

SIEM as a Service

Follow Us on Google News

A network of suspected North Korean IT workers is using GitHub to create and backstop fake personas, aiming to infiltrate companies globally, particularly in Japan and the United States.

DPRK-Linked Network Targets Companies in Japan and US

Cybersecurity firm Nisos has uncovered this operation, which appears to be part of Pyongyang’s efforts to fund its ballistic missile and nuclear weapons programs.

The network’s modus operandi involves creating elaborate backstories for these personas, claiming Vietnamese, Japanese, or Singaporean nationality.

These fictitious identities seek remote positions in engineering and full-stack blockchain development, leveraging GitHub to establish credibility.

Cyber Attacks
Network map of likely DPRK-affiliated personas.

Sophisticated Persona Creation and Digital Manipulation

The DPRK-affiliated actors have demonstrated a high level of sophistication in their persona creation.

They utilize digitally manipulated profile photos, often superimposing faces onto stock images to create the illusion of the individual working with colleagues.

These personas claim extensive experience in web and mobile application development, proficiency in multiple programming languages, and blockchain technology expertise.

To further solidify their online presence, the network creates accounts on various platforms, including employment websites, IT industry-specific freelance platforms, and software development tools.

Cyber Attacks
Listed program languages on Huy Diep’s website

However, they notably lack social media accounts, suggesting these personas are created solely for employment acquisition.

One such persona, operating under the names Huy Diep and HuiGia Diep, claims employment as a software engineer at Japanese consulting company Tenpct Inc since September 2023.

This persona’s GitHub account, nickdev0118, was found to have co-authored commits with another suspected DPRK IT worker account, AnacondaDev0120.

The investigation revealed that at least two personas from this network have successfully obtained employment at companies with fewer than 50 employees.

This success underscores the potential threat posed by these operations to smaller organizations that may lack robust vetting processes.

Nisos’s findings highlight the evolving tactics of North Korean cyber operations, demonstrating their ability to adapt and exploit legitimate platforms like GitHub for malicious purposes.

As these actors continue to refine their methods, businesses worldwide must remain vigilant and implement stringent verification processes to protect against such sophisticated employment fraud schemes.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

SecP0 Ransomware Gang Threatens to Expose Critical Vulnerabilities

A new ransomware collective dubbed SecP0 has emerged with a disruptive strategy that diverges sharply from...

Malicious Android App on Google Play Compromises 220,000+ Devices

Security researchers at ThreatLabz recently uncovered a sophisticated malware campaign operating through the Google...

Technical Analysis Released on Bybit Hot Wallet Exploit

Cryptocurrency exchange Bybit suffered a sophisticated smart contract exploit on February 21, 2025, resulting...

Google Unveils GoStringUngarbler to Crack Go-Based Malware Encryption

Google's FLARE team has released GoStringUngarbler, an open-source tool designed to dismantle string obfuscation in...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SecP0 Ransomware Gang Threatens to Expose Critical Vulnerabilities

A new ransomware collective dubbed SecP0 has emerged with a disruptive strategy that diverges sharply from...

Malicious Android App on Google Play Compromises 220,000+ Devices

Security researchers at ThreatLabz recently uncovered a sophisticated malware campaign operating through the Google...

Technical Analysis Released on Bybit Hot Wallet Exploit

Cryptocurrency exchange Bybit suffered a sophisticated smart contract exploit on February 21, 2025, resulting...